mba

Results 101 - 125 of 322Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services     Published Date: Jan 23, 2018
The notion of digitizing your business has become a matter of “when,” rather than “if.” For many, migrating critical workloads to the cloud is a key part of this transformation. When deciding on a cloud provider, however, IT executives are under pressure to find a solution that enables reduced costs, greater agility, and above all, the ability to innovate core business processes. At the heart of many businesses embarking on this journey is their SAP environment. But since SAP workloads represent some of the most critical and deeply integrated business applications, IT executives are required to look for ways to execute this migration in the most timely and reliable manner. Organizations migrating to the cloud cannot risk application downtime or productivity loss. Provided by: AWS & Intel
Tags : 
sap, optimization, migration, aws, network
    
Amazon Web Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : 
messagelabs, compliance, email policies, policy, enforce policy
    
MessageLabs
Published By: SAS     Published Date: Apr 16, 2015
Big data has made quite an impression on organizations embarking on data journeys, hoping to glean valuable insights ranging from process optimization to customer-facing improvements. This research paper explores proven best practices that can help organizations overcome obstacles to deliver on big data potential.
Tags : 
    
SAS
Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad, gestión de ti, next generation firewall
    
McAfee
Published By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw, ngips, ips de próxima generación, next generation firewall, next generation ips, seguridad, gestión de ti
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas
    
McAfee
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: BI WORLDWIDE     Published Date: Jul 28, 2014
The number of employees still engaged after their first six months on the job is roughly 40%. As the workplace continues to evolve, it’s more important than ever to develop an engagement strategy that will combat the fatigue you’ll see among the other 60% of your employees. You can’t rely on 20th-century strategies for 21st-century challenges. Download our article to learn the top 6 workplace trends you’ll experience in 2015, as well as best practices to follow to drive engagement.
Tags : 
bi worldwide, employee engagement, employee recognition, social recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, engagement survey, rewards and recognition, employee programs, recognition ideas, employee motivation, recognition program ideas, human resources
    
BI WORLDWIDE
Published By: Oracle     Published Date: Jan 28, 2015
In the not-too-distant past, a retailer simply had store-level sales data, from which virtually all planning decisions were made. Today, retailers—from grocery to fashion—are bombarded with data that, with the right tools, can help them gain actionable insight into shoppers’ behavior across channels. In this white paper Oracle Retail explains how retailers can accurately measure consumer interest in specific merchandise and apply that knowledge from one channel to the next, thoroughly understand the implications of promotions on specific customers and customer segments, price on product performance, plan channel-specific assortments accordingly, and coordinate the supply chain processes to ensure execution of the cross channel plan.
Tags : 
    
Oracle
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Throughout its operations, Broadlawn Manor Nursing & Rehabilitation Center has embraced technology as a means of enhancing resident safety and independence, and staff productivity. The facility had been a satisfied user of STANLEY Healthcare’s WatchMate wander management system for many years, but in 2010, Vice President of Senior Services Gerard Kaiser and his team embarked on a review of Broadlawn Manor’s wander management needs and took the decision to migrate to a new generation of technology with greater functionality. Read this case study to learn how Long Island Nursing & Rehabilitation Center achieves more accurate, convenient and efficient wander management with RoamAlert® Solution.
Tags : 
wander management, healthcare, nursing, rehabilitation, resident safety, resident independence, medical technology
    
STANLEY Healthcare
Published By: Tapinfluence     Published Date: Jul 20, 2016
Why the future of influencer marketing starts with people and relationships not popularity. Together, we studied the state of influencer marketing by surveying marketers and then separately polling influencers to get a balanced view. The insights were compelling. When compared, they were also revealing.
Tags : 
influencer marketing, content marketing, social media, marketing communications, influencers, marketers, site ambassadorships, authenticity, engagement, marketing channels, social marketing, digital influencer, digital agency, conversations
    
Tapinfluence
Published By: Juniper Networks     Published Date: Aug 08, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
As enterprises embark on the digital transformation to take advantage of artificial intelligence, big data, machine learning, IoT, and cloud, they need a network infrastructure that gives them a solid foundation. Juniper Networks® Unite CloudEnabled Enterprise allows networking across your entire enterprise—campus, branch, and data center—ultimately helping you reduce risk, increase agility, lower costs, and enhance the customer experience. Here are the Top 6 reasons why enterprises embarking on the journey of digital transformation should switch to the Juniper Unite Cloud-Enabled Enterprise solution.
Tags : 
    
Juniper Networks
Published By: Sprinklr     Published Date: Sep 28, 2017
Jon Lombardo, Creative Lead, LinkedIn, reveals in this presentation how B2B businesses can improve their content strategy in 2017. In particular, he points out why the “Newspaper Model” is difficult to scale and harder to monetize while a B2B “Blockbuster” approach can monetize a brand’s expertise.
Tags : 
b2b marketing, b2b marketing strategy, marketing strategy, marketing trends, brand recognition, omni-channel, employee advocacy, people first, relevant reach
    
Sprinklr
Published By: SAP     Published Date: Dec 10, 2018
In a consumer-driven digital economy, the pace of innovation is relentless. This era of intelligent mega-processes requires businesses to combine the right data sets and convert them into intelligent insights. The path to this digital transformation is not easy and studies have shown that 8 out of 10 early digital transformation initiatives have failed. Your transformation journey can be successful with the right approach. Download this paper to learn how you can embark on your journey to the Intelligent Enterprise.
Tags : 
    
SAP
Published By: Rand Secure Archive     Published Date: Jun 06, 2013
This whitepaper discusses how creating an email archiving process before embarking on a Microsoft Exchange upgrade can eliminate these problems, saving time and money for organizations.
Tags : 
archiving, logical, microsoft exchange
    
Rand Secure Archive
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Curalate     Published Date: Jan 09, 2017
How to build relationships with Instagram stars, bloggers and social experts to gain audience and drive engagement. Download now!
Tags : 
instagram, social media, brand ambassador, micro-influencer
    
Curalate
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.